959 resultados para Communication protocols
Resumo:
With the growth and development of communication technology there is an increasing need for the use of interception technologies in modern policing. Law enforcement agencies are faced with increasingly sophisticated and complex criminal networks that utilise modern communication technology as a basis for their criminal success. In particular, transnational organised crime (TOC) is a diverse and complicated arena, costing global society in excess of $3 trillion annually, a figure that continues to grow (Borger, 2007) as crime groups take advantage of disappearing borders and greater profit markets. However, whilst communication can be a critical success factor for criminal enterprise it is also a key vulnerability. It is this vulnerability that the use of CIT, such as phone taps or email interception, can exploit. As such, law enforcement agencies now need a method and framework that allows them to utilise CIT to combat these crimes efficiently and successfully. This paper provides a review of current literature with the specific purpose of considering the effectiveness of CIT in the fight against TOC and the groundwork that must be laid in order for it to be fully exploited. In doing so, it fills an important gap in current research, focusing on the practical implementation of CIT as opposed to the traditional area of privacy concerns that arise with intrusive methods of investigation. The findings support the notion that CIT is an essential intelligence gathering tool that has a strong place within the modern policing arena. It identifies that the most effective use of CIT is grounded within a proactive, intelligence‐led framework and concludes that in order for this to happen Australian authorities and law enforcement agencies must re‐evaluate and address the current legislative and operational constraints placed on the use of CIT and the culture that surrounds intelligence in policing.
Resumo:
Diversity techniques have long been used to combat the channel fading in wireless communications systems. Recently cooperative communications has attracted lot of attention due to many benefits it offers. Thus cooperative routing protocols with diversity transmission can be developed to exploit the random nature of the wireless channels to improve the network efficiency by selecting multiple cooperative nodes to forward data. In this paper we analyze and evaluate the performance of a novel routing protocol with multiple cooperative nodes which share multiple channels. Multiple shared channels cooperative (MSCC) routing protocol achieves diversity advantage by using cooperative transmission. It unites clustering hierarchy with a bandwidth reuse scheme to mitigate the co-channel interference. Theoretical analysis of average packet reception rate and network throughput of the MSCC protocol are presented and compared with simulated results.
Resumo:
This catalogue essay discusses the work of contemporary Brisbane artist Grant Stevens. It provides a survey of his video work and discusses the artist's use of cliche and other mediated formulas to explore the nature of media and its impact on consciousness in the early 21st century.
Resumo:
Social media, including Facebook and Twitter, played an important role in crisis communication at the height of the 2011 South East Queensland floods crisis (10-16 January). This report examines the role of the short-messaging system Twitter in disseminating and sharing crisis information and updates from state and local authorities as well as everyday citizens. We assess the overall use of Twitter, as well as that of the most important emergency service account, the Queensland Police’s @QPSMedia account.
Resumo:
An Introduction to Political Communication introduces students to the complex relationship between politics, the media and democracy in the United Kingdom, United States and other contemporary societies. Brian McNair examines how politicians, trade unions, pressure groups, NGOs and terrorist organisations make use of the media. Individual chapters look at political media and their effects, the work of political advertising, marketing and public relations, and the communicative practices of organizations at all levels, from grass-root campaigning through to governments and international bodies. This fifth edition has been revised and updated to include: • the 2008 US presidential election, and the early years of Barack Obama’s term • the MPs’ expenses scandal in Britain, and the 2010 UK election campaign • the growing role of bloggers and online pundits such as Guido Fawkes in the political agenda setting process • the emergence of social media platforms such as Twitter, YouTube and Facebook, and their destabiising impact on the management of political crises all over the world, including the Iranian pro-reform protests of July 2009 and the Israeli atack on the anti-blockade flotilla of May 2010 • the growing power of Wikileaks and other online information sources to challenge state control of classified information
Resumo:
Swelling social need and competing calls on government funds have heightened the philanthropic dollar’s value. Yet, Australia is not regarded as having a robust giving culture: while 86% of adults give, a mere 16% plan their giving with those who do donating four times as much as spontaneous givers (Giving Australia, 2005). Traditionally, the prime planned giving example is a charitable bequest, a revenue stream not prevalent here (Baker, 2007). In fact, Baker’s Victorian probate data shows under 5% of estates provide a charitable bequest and just over 1% of estate assets is bequeathed. The UK, in contrast, sources 30% and the US 10% of charitable income through bequests (NCVO, 2004; Sargeant, Wymer and Hilton,2006). Australian charities could boost bequest giving. Understanding the donor market, which has or may remember them in their will is critical. This paper reports donor perceptions of Australian charities’ bequest communication/ marketing. The data forms part of a wider study of Australian donors’ bequest attitudes and behaviour. Charities spend heavily on bequest promotion, from advertising to personal selling to public relations and promotion. Infrastructure funds are scarce so guidance on what works for donors is important. Guy and Patton (1988) made their classic call for a nonprofit marketing perspective and identify the need for charities to better understand the motivations and behaviour of their supporters. In similar vein, this study aims to improve the way nonprofits and givers interact; and ultimately, enhance the giving experience and thus multiply planned giving participation. Academically, it offers insights to Australian bequest motivations and attitudes not studied empirically before.
Resumo:
The improvement and optimization of business processes is one of the top priorities in an organization. Although process analysis methods are mature today, business analysts and stakeholders are still hampered by communication issues. That is, analysts cannot effectively obtain accurate business requirements from stakeholders, and stakeholders are often confused about analytic results offered by analysts. We argue that using a virtual world to model a business process can benefit communication activities. We believe that virtual worlds can be used as an efficient model-view approach, increasing the cognition of business requirements and analytic results, as well as the possibility of business plan validation. A healthcare case study is provided as an approach instance, illustrating how intuitive such an approach can be. As an exploration paper, we believe that this promising research can encourage people to investigate more research topics in the interdisciplinary area of information system, visualization and multi-user virtual worlds.
Resumo:
This volume represents the proceedings of the 13th ENTER conference, held at Lausanne, Switzerland during 2006. The conference brought together academics and practitioners across four tracks, which were eSolutions, refereed research papers, work-in-progress papers, and a Ph.D workshop. This proceedings contains 40 refereed papers, which is less that the 51 papers presented in 2005. However, the editors advise the scientific committee was stricter than in previous years, to the extent that the acceptance rate was 50%. A significant change in the current proceedings is the inclusion of extended abstracts of the 23 work-in-progress presentations. The papers cover a diverse range of topics across 16 research streams. This reviewer has adopted the approach of succinctly summarising the contribution of each of the 40 refereed papers, in the order in which they appear...
Resumo:
This volume represents the proceedings of the 12th ENTER conference held at Innsbruck in 2005. While the conference also accepts work-in-progress papers and includes a Ph.D. workshop, the proceedings contain 51 research papers by 102 authors. The general theme of the conference was eBusiness is here—what is next? and the papers cover a diverse range of topics across nine tracks. This reviewer has adopted the approach of succinctly summarising the contribution of each of the papers, in the order they appear....
Resumo:
"This volume represents the proceedings of the 10th ENTER conference, held in Helsinki, Finland during January 2003. The conference theme was ‘technology on the move’, and the 476pp. proceedings offer 50 papers by 108 authors. The editors advise all papers were subject to a double blind peer review. The research has been categorised into 18 broad headings, which reflects the diversity of topics addressed. This reviewer has adopted the approach of succinctly summarising each of the papers, in the order they appear, to assist readers of Tourism Management in judging the potential value of the content for their own work..." -- publisher website
Resumo:
Historically, occupational health and safety has primarily presented as attempts to create a safer work environment for employees. The mining industry carries health and safety risks, often greater than other occupations. Whilst the mining industry is regulated by stringent workplace health and safety regulations, the very nature of the work and environmental influences expose employees to a greater number of injury risk factors than many other industries. The application of risk management techniques has resulted in a substantial decline in injury rates observed for mining operations in developed countries (Donoghue, 2004). This essential focus can be complemented by a more comprehensive approach to occupational health and safety that also supports the design and delivery of proactive health promotion programs...
Resumo:
This fourth edition of Communication, Cultural and Media Studies: The Key Concepts is an indispensible guide to the most important terms in the field. It offers clear explanations of the key concepts, exploring their origins, what they’re used for and why they provoke discussion. The author provides a multi-disciplinary explanation and assessment of the key concepts, from ‘authorship’ to ‘censorship’; ‘creative industries’ to ‘network theory’; ‘complexity’ to ‘visual culture’. The new edition of this classic text includes: * Over 200 entries including 50 new entries * All entries revised, rewritten and updated * Coverage of recent developments in the field * Insight into interactive media and the knowledge-based economy * A fully updated bibliography with 400 items and suggestions for further reading throughout the text
Resumo:
Purpose of review: This review provides an overview on the importance of characterising and considering insect distribution infor- mation for designing stored commodity sampling protocols. Findings: Sampling protocols are influenced by a number of factors including government regulations, management practices, new technology and current perceptions of the status of insect pest damage. The spatial distribution of insects in stored commodities influ- ences the efficiency of sampling protocols; these can vary in response to season, treatment and other factors. It is important to use sam- pling designs based on robust statistics suitable for the purpose. Future research: The development of sampling protocols based on flexible, robust statistics allows for accuracy across a range of spatial distributions. Additionally, power can be added to sampling protocols through the integration of external information such as treatment history and climate. Bayesian analysis provides a coherent and well understood means to achieve this.
Resumo:
The privacy of efficient tree-based RFID authentication protocols is heavily dependent on the branching factor on the top layer. Indefinitely increasing the branching factor, however, is not a viable option. This paper proposes the alternate-tree walking scheme as well as two protocols to circumvent this problem. The privacy of the resulting protocols is shown to be comparable to that of linear-time protocols, where there is no leakage of information, whilst reducing the computational load of the database by one-third of what is required of tree-based protocols during authentication. We also identify and address a limitation in quantifying privacy in RFID protocols.